This bug was fixed in the package linux-gke - 5.15.0-1003.3
--------------- linux-gke (5.15.0-1003.3) jammy; urgency=medium
* jammy/linux-gke: 5.15.0-1003.3 -proposed tracker (LP: #1969493)
* Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/master)
[ Ubuntu: 5.15.0-27.28 ]
* jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)
[ Ubuntu: 5.15.0-26.27 ]
* jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850) * CVE-2022-1016 - netfilter: nf_tables: initialize registers in nft_do_chain() * CVE-2022-1015 - netfilter: nf_tables: validate registers coming from userspace. * CVE-2022-26490 - nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION * harden indirect calls against BHI attacks (LP: #1967579) - objtool: Classify symbols - objtool: Explicitly avoid self modifying code in .altinstr_replacement - objtool: Shrink struct instruction - objtool,x86: Replace alternatives with .retpoline_sites - x86/retpoline: Remove unused replacement symbols - x86/asm: Fix register order - x86/asm: Fixup odd GEN-for-each-reg.h usage - x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h - x86/retpoline: Create a retpoline thunk array - x86/alternative: Implement .retpoline_sites support - x86/alternative: Handle Jcc __x86_indirect_thunk_\reg - x86/alternative: Try inline spectre_v2=retpoline,amd - x86/alternative: Add debug prints to apply_retpolines() - bpf,x86: Simplify computing label offsets - bpf,x86: Respect X86_FEATURE_RETPOLINE*
-- Paolo Pisati <email address hidden> Wed, 20 Apr 2022 07:08:36 +0200
This bug was fixed in the package linux-gke - 5.15.0-1003.3
---------------
linux-gke (5.15.0-1003.3) jammy; urgency=medium
* jammy/linux-gke: 5.15.0-1003.3 -proposed tracker (LP: #1969493)
* Packaging resync (LP: #1786013) dkms-versions -- update from kernel-versions (main/master)
- debian/
[ Ubuntu: 5.15.0-27.28 ]
* jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)
[ Ubuntu: 5.15.0-26.27 ]
* jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850) replacement thunk_\ reg v2=retpoline, amd RETPOLINE*
* CVE-2022-1016
- netfilter: nf_tables: initialize registers in nft_do_chain()
* CVE-2022-1015
- netfilter: nf_tables: validate registers coming from userspace.
* CVE-2022-26490
- nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
* harden indirect calls against BHI attacks (LP: #1967579)
- objtool: Classify symbols
- objtool: Explicitly avoid self modifying code in .altinstr_
- objtool: Shrink struct instruction
- objtool,x86: Replace alternatives with .retpoline_sites
- x86/retpoline: Remove unused replacement symbols
- x86/asm: Fix register order
- x86/asm: Fixup odd GEN-for-each-reg.h usage
- x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
- x86/retpoline: Create a retpoline thunk array
- x86/alternative: Implement .retpoline_sites support
- x86/alternative: Handle Jcc __x86_indirect_
- x86/alternative: Try inline spectre_
- x86/alternative: Add debug prints to apply_retpolines()
- bpf,x86: Simplify computing label offsets
- bpf,x86: Respect X86_FEATURE_
-- Paolo Pisati <email address hidden> Wed, 20 Apr 2022 07:08:36 +0200